Sciweavers

84 search results - page 7 / 17
» Filtering with raster signatures
Sort
View
MEDIAFORENSICS
2010
15 years 1 months ago
Digital image authentication from thumbnails
We describe how to exploit the formation and storage of an embedded image thumbnail for image authentication. The creation of a thumbnail is modeled with a series of filtering ope...
Eric Kee, Hany Farid
ACSAC
2008
IEEE
15 years 6 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
IJNSEC
2006
56views more  IJNSEC 2006»
14 years 11 months ago
Traffic Filtering and Routing in Partially-Hidden Networks
Suppose that an organization O wants to do the following: to reveal only part of its network map; to filter unwanted traffic passing through its network; and to route, to the righ...
Deholo Nali, Ali Miri, Carlisle M. Adams
EVOW
2004
Springer
15 years 5 months ago
Aesthetic Video Filter Evolution in an Interactive Real-Time Framework
A data-flow network-based interactive evolutionary design framework is presented which will provide a testbed for the development and exploration of a diverse range of visual arti...
Matthew Lewis
EDBT
2008
ACM
178views Database» more  EDBT 2008»
15 years 11 months ago
Compacting music signatures for efficient music retrieval
Music information retrieval is becoming very important with the ever-increasing growth of music content in digital libraries, peer-to-peer systems and the internet. While it is ea...
Bin Cui, H. V. Jagadish, Beng Chin Ooi, Kian-Lee T...